![]() It is recommended to upgrade the affected component. Upgrading to version 4.1.0 is able to address this issue. The exploit has been disclosed to the public and may be used. ![]() The manipulation of the argument jsondata with the input netstat -ano leads to os command injection. This vulnerability affects unknown code of the file /php/ping.php. The associated identifier of this vulnerability is VDB-248259.Ī vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It is possible to initiate the attack remotely. The manipulation of the argument command with the input whoami leads to os command injection. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |